• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
The modelling and analysis of security protocols :

پدید آورنده
P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe

موضوع
Computer network protocols,Computer networks-- Security measures,Computer security-- Mathematical models,Computer software-- Verification,Computers-- Access control,Cryptography

رده
TK5105
.
59
.
R93
2001

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0201674718
(Number (ISBN
9780201674712

NATIONAL BIBLIOGRAPHY NUMBER

Number
dltt

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
The modelling and analysis of security protocols :
General Material Designation
[Book]
Other Title Information
the CSP approach /
First Statement of Responsibility
P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xiv, 300 pages :
Other Physical Details
illustrations ;
Dimensions
24 cm

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references (pages 285-291) and index

CONTENTS NOTE

Text of Note
Introduction -- An introduction to CSP [Communicating Sequential Processes] -- Modelling security protocols in CSP -- Expressing protocol goals -- Overview of FDR -- Casper -- Encoding protocols and intruders for FDR -- Theorem proving -- Simplifying transformations -- Other approaches -- Prospects and wider issues -- Background cryptography -- The Yahalom protocol in Casper -- CyberCash rank function analysis
0

OTHER EDITION IN ANOTHER MEDIUM

Title
Modelling and analysis of security protocols.

PARALLEL TITLE PROPER

Parallel Title
Security protocols

TOPICAL NAME USED AS SUBJECT

Computer network protocols
Computer networks-- Security measures
Computer security-- Mathematical models
Computer software-- Verification
Computers-- Access control
Cryptography

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
21

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59
Book number
.
R93
2001

PERSONAL NAME - PRIMARY RESPONSIBILITY

Ryan, Peter,PhD

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Schneider, S. A., (Steve A.)

ORIGINATING SOURCE

Date of Transaction
20160712065609.0

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival